lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 8 Mar 2022 22:57:18 -0800 From: Josh Poimboeuf <jpoimboe@...hat.com> To: Peter Zijlstra <peterz@...radead.org> Cc: x86@...nel.org, joao@...rdrivepizza.com, hjl.tools@...il.com, andrew.cooper3@...rix.com, linux-kernel@...r.kernel.org, ndesaulniers@...gle.com, keescook@...omium.org, samitolvanen@...gle.com, mark.rutland@....com, alyssa.milburn@...el.com, mbenes@...e.cz, rostedt@...dmis.org, mhiramat@...nel.org, alexei.starovoitov@...il.com Subject: Re: [PATCH v4 00/45] x86: Kernel IBT On Tue, Mar 08, 2022 at 12:06:18PM -0800, Josh Poimboeuf wrote: > As talked about on IRC there are still a few outstanding issues, that > I'm fine with fixing after the merge window during the upcoming -next > cycle: > > - xen hypercall page functions need 'ret' - (I think you already fixed) > > - why don't unreachables need to fill up the entire sym hole? > > - get rid of the 'c_file' hack > > - improve cmdline option intuitive-ness > > - properly integrate the retpoline "demotion" with the new Spectre BHI > related patches - probably still needs more discussion - for example > we might instead want to disable IBT and warn One more: - Changing objtool should force a vmlinux re-link. -- Josh
Powered by blists - more mailing lists